We were unable to load Disqus. If you are a moderator please see our troubleshooting guide.

Guest • 9 years ago

It's already July...when will we get free SSL?

eastdakota • 9 years ago

Be patient. It's on schedule. As you may imagine, having CFSSL in place and rock solid is a requirement for making SSL available to everyone.

Jim • 9 years ago

I can't wait for free SSL

zbowling • 9 years ago

CFSSL name is overloaded with CoreFoundation's CFNetwork SSL socket names :-) as an apple mac and iOS developer I was very confused.

Andrew • 9 years ago

It's already July...when will we get free SSL?

dharani kumar • 3 years ago

Why to go with http api server? Aren't api request and responses contains sensitive information? So shouldn't we default to https instead of http?

陈凡 • 6 years ago

I found that the expiry of generated root certificate is only 5 years. Is there any way to specify the time limit for the generated root certificate?

fbifido • 8 years ago

What's the update on CFSSL ?
How is CloudFlare using it now, any improvement?
thanks.

fbifido • 9 years ago

Hi,
How can one install and configure CFSSL for uses like:

1) Replace a MS CA for internal network (pc/laptop/servers/users) in a MS domain?
2) For my own external facing website ?
3) For external devices connecting into my internal network ?
4) with ECDSA
5) auto deploy, auto renewals, auto cleanups, plus can tied to AD.

Thanks.

yggdrasil • 9 years ago

This is awesome. Looks like I'll be able to use this to automate my company's TLS request/renewal workflow. Thanks for making it open-source.

Michael Daly • 9 years ago

Nice one guys.. Will be really useful tool.

Carlos A. Carnero Delgado • 9 years ago

Really nice! Are there binaries available? Say, for Linux 64 bits? Just wondering, since I don't have the Go stack installed.

n1x0n • 9 years ago

OR you could just use EJBCA...

Alexander Loginov • 9 years ago

CFSSL is easier to use for CloudFlare-customers. CFSSL is open-source in full mode (like EJBCA Enterprise, which is paid) with full compability of all existing browsers. CloudFlare have more knowledges on what users need, because CloudFlare have much more users than EJBCA. CloudFlare can adopt faster to the changes in IT-world.

Anders Henke • 9 years ago

EJBCA is also open-source and if you'd like to receive support for EJBCA, you can pay for EJBCA Enterprise - but that's about it. A few things in CFSSL are of questionable impact for security, e.g. the "gencert" function does ask the issuing CA to create a private key AND issue a matching certificate in one step. This looks handy from a users perspective, but results in the fact that the issuing CA technically can keep a copy of the private key - which may become compromised or misused without the users consent or knowledge. So from a security perspective, this function should never be used, unless you're also operating the CA and really do know what you're doing :-) If you're looking for a light-weight, open-source CA-solution, r509.org also comes to my mind. CFSSL is still an interesting software: to bundle certificates with their intermediate certificates.

Mike • 9 years ago

Nice! Looking forward to the TPM integration as well, that would be very helpful.

neoKushan • 9 years ago

This is pretty cool sounding. Can I ask something, though? As I only have the most basic understanding of what's going on here.

We have a wildcard SSL certificate, so it validates *.our.domain.com. Could we use this utility and that certificate to generate valid (And trusted) SSL certificates for say specificsubdomain.our.domai... or have I misunderstood this?

Anders Henke • 9 years ago

Technically, you can use your existing key/cert to sign and issue new certificates - but nobody is willing to trust them, as your certificate is lacking a special usage bit for this kind of operation. There are also technical options (x509v3 name restrictions) to limit the kinds of certificates you could issue, but they're not that wide spread that these options can be enforced. As a consequence, no CA today will issue a CA-certificate which is restricted to issue certificates for anything below .our.domain.com.

Nick Sullivan • 9 years ago

This tool does not let you change the contents of an already existing certificate. The only way to get a trusted certificate is buying one through a CA. This tool can make sure that when you use that certificate for your website, it is accessible from all browsers.

fbifido • 8 years ago

say I am neoKushan, and I install cfssl, my bundle certificate would look like this:
neoKushan leaf → GlobalSign SHA2 Intermediate → GS Root G2

What are the commands needed to create a internet/production ready CA, that can generate certificate for any server on my domain "xxxxx.our.domain.com"?
What do I need from or give to GlobalSign to get my CA certify? so that I can start creating certs?
Do I need a special certificate or just generate a CSR on the cfssl server, and buy a 3-year normal certificate?
How do I go about certifying all my windows servers?
Can these be scripts using powershell ?
Thanks.

neoKushan • 9 years ago

Ah ok, thanks for the response!

Filip Oščádal • 9 years ago

good work! will come handy :D

Rob Orr • 9 years ago

Very cool - love seeing what you guys are up to.